Selected Areas in Cryptography : 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24-26, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Selected Areas in Cryptography : 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24-26, 2022, Revised Selected Papers (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 480 p.
  • 言語 ENG
  • 商品コード 9783031584107
  • DDC分類 005.824

Full Description

This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.

The 21 full papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are categorized into the following topical sections: lattices and ECC; differential cryptanalysis; cryptographic primitives; isogeny-based cryptography I; block ciphers; differential cryptanalysis II; isogeny-based cryptography II; and protocols and PRFs.

Contents

1 Lattices and ECC.- Profiling Side-Channel Attacks on Dilithium: A Small Bit-Fiddling Leak Breaks It All.- On the Weakness of Ring-LWE mod Prime Ideal q by Trace Map.- 2D-GLS: Faster and Exception-free Scalar Multiplication in the GLS254 Binary Curve.- 2 Differential Cryptanalysis.- Key-Recovery Attacks on CRAFT and WARP.- Differential Analysis of the Ternary Hash Function Troika.- Another Look at Differential-Linear Attacks.- 3 Cryptographic Primitives.- Rank Metric Trapdoor Functions with Homogeneous Errors.- PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords.- Improved Circuit-based PSI via Equality Preserving.- 4 Isogeny-Based Cryptography I.- Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge.- Patient Zero: Zero-Value Attacks on CSIDH and Variants.- An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves.- 5 Block Ciphers.- Finding All Impossible Differentials When Considering the DDT.- A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair.- Collision-Based Attacks on White-Box AES Implementations.- 6 Differential Cryptanalysis II.- Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN.- Improving the Automated Evaluation Algorithm against Differential Attacks and Application to WARP.- 7 Isogeny-based Cryptography II.- Faster Cryptographic Hash Function from Supersingular Isogeny Graphs.- 8 Protocols and PRFs.- From Plaintext-extractability to IND-CCA Security.- Farasha: A Provable Permutation-based Parallelizable PRF.- A Sponge-Based PRF with Good Multi-user Security.